GB2379583A - Outgoing call control and data transfer for a portable terminal device - Google Patents

Outgoing call control and data transfer for a portable terminal device Download PDF

Info

Publication number
GB2379583A
GB2379583A GB0215887A GB0215887A GB2379583A GB 2379583 A GB2379583 A GB 2379583A GB 0215887 A GB0215887 A GB 0215887A GB 0215887 A GB0215887 A GB 0215887A GB 2379583 A GB2379583 A GB 2379583A
Authority
GB
United Kingdom
Prior art keywords
data
terminal device
mobile terminal
channel data
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB0215887A
Other versions
GB2379583B (en
GB0215887D0 (en
Inventor
Takashi Moriki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Publication of GB0215887D0 publication Critical patent/GB0215887D0/en
Publication of GB2379583A publication Critical patent/GB2379583A/en
Application granted granted Critical
Publication of GB2379583B publication Critical patent/GB2379583B/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

A mobile telephone or other terminal device monitors the control data channel with the radio base station. When the phone is lost, the control data channel contains special data, and outgoing call control is executed, unauthorised browsing of personal data is prohibited, and personal data is pulled out from the mobile phone. Unauthorised use and leakage of personal data are prevented without the need to establish an open communication channel with the mobile phone. The device may be used in a data storage system which is connected to a public line network through a modem, and is provided with a personal computer operated by a user. The personal computer can establish communications between a base station and a lost mobile phone. Permission data for outgoing call control arid protection of personal data is entered in the lost mobile phone. It is determined whether or not the permission data matches a request data from the personal computer. When they match each other, the personal data pulled out of the lost mobile phone is stored in the personal computer. The personal data can be transferred by connecting a substitute mobile phone through a connection cable.

Description

PORTABLE TERMINAL DEVICE
ANI) METHODS THEREFOR
BACKGROUND OF THE INVENTION
The present invention relates to a portable terminal device, particularly a wireless portable terminal device, to an outgoing call control method, and to a data transfer method.
Portable terminal devices and mobile phones, which are generally referred to as a' PHS" and "cell phone," are small and lightweight, and are provided with various additional functions, and they have made remarkable progress and are practically replacing the conventional cable telephone system.
Mobile phones have not only a basic communications function, but also a telephone book function, an outgoing call history entry function, an incoming call history entry function, a memo recording function, etc. Generally, a user's personal data are stored in a memory in advance to carry out the above functions. And then, the user, by handling the operation button(s), can fetch the contents of the memory at any time.
Moreover, mobile phones typically have a locking dial function to prevent billing the owner of the mobile phone for an unauthorized outgoing call made by a person other than the owner when the mobile phone is stolen or lost. The function also prohibits them from browsing personal data stored in the memory.
This dial lock capability can be set by the owner of the mobile phone by registering his or her password in the mobile phone, and pressing a specific operation button, e.g.,, pressing a function key for a prolonged time. The dial lock can be released by inputting the registered password, and pressing the specific operation button, e.g.,, pressing the communications button for a prolonged time.
Although an unauthorized outgoing call or unauthorized browsing of personal data can be almost completely deleted by constantly using the above mentioned dial lock, and releasing the lock each time communications are started, setting a dial lock and releasing the lock each time communications are started is ti,lle-consull.ing, and therefore not perfolllled. Therefore, when a rllobile phone is stolen or lost, there is the possibility that a person other than the owner uses the mobile phone without authorization, thereby causing financial damage and unauthorized browsing through personal data.
Therefore, as disclosed in Japanese Patent Laid-Open No. 2000-
151798, a signal code for controlling outgoing call and for prohibition against browsing personal data is entered in advance in the body of a mobile phone. The lost mobile phone is called from a subscribed phone or another mobile phone through an exchange system. A request code is transmitted with a communications circuit established, and outgoing call control is executed and memory data is locked when the signal code of the lost mobile phone matches the request code.
Simultaneously, the personal data is pulled out by the equipment such as the personal computer, etc. connected to a telephone line as necessary, and then the personal data stored on the lost mobile phone is deleted.
-2
The above mentioned case can also be applied not only to a lost mobile phone, but also to all portable terminal devices such as mobile personal computers or personal digital assistants having the communication 5 functions.
The conventional portable terminal device can lock an operation key or personal data to prevent an unauthorized use or unauthorized leakage of personal data by a third party using stolen or lost equipment only after a 10 communications channel circuit is established. That is, the above mentioned process can only be performed when an answer is returned in response to a call to a stolen or lost portable terminal device. However, it is not likely that a third party will answer the call to the stolen or lost 15 equipment. Therefore, the condition of possibly issuing an unauthorized outgoing call and browsing personal data still continues. As a result, a countermeasure is only to issue a request an exchange center to reject an outgoing call, and to perform the outgoing call rejection by the exchange 20 center, thereby having no means for prohibition against browsing personal data.
SUMMARY OF THE INVENTION
According to one aspect of the present invention a 25 mobile terminal device comprises a radio means for communicating communications channel data with a radio base station, and for communicating control channel data - 3 -
with the radio base station at an appropriate timing independent of the control channel data. The mobile terminal device also comprises storing means for storing a predetermined information and judging means for judging whether the predetermined information is contained in the control channel data received by the radio means. The mobile terminal device further comprises controlling means for controlling the radio means on the basis of the result of the judging means. The controlling means exerts control over an outgoing call if the predetermined information is contained in the control channel data. The conkolling means may prohibit a key operation for issuing a call from the mobile terminal device. The predeter,iined ir.fo...ztion is the data that requests outgoing, cat! control. Preferably, mobile terminal device further comprises display means for displaying contents of outgoing call control when it is performed.
Moreover, a mobile terminal device of the present invention comprises radio means for communicating communications channel data with a radio base station, and for communicating control channel data with the radio base station at an appropriate timing independent of the control channel data. The mobile terminal device farther comprises storing means for storing a predetermined information and a personal information and judging means for judging whether the predetermined information is contained in the control channel data received by the radio means.
The mobile terminal device further comprises controlling means for controlling the personal information on the basis of the result of the judging means. The controlling means transfers a personal information stored in the mobile terminal device if the predetermined information is contained in the control channel data. The personal information is transferred to a personal computer connected to at least a radio - 4
channel or a cable channel. The controlling means may prohibit a key operation for reading the personal information. Preferably, the mobile terminal device further comprises display means for displaying contents of data locking when it is performed. An outgoing call control method of the present invention comprises storing a predetermined information, communicating communications channel data with a radio base station, communicating control channel data with the radio base station at an appropriate timing independent of the control channel data, judging whether the predetermined information is contained in the control channel data and controlling an outgoing call if the predetermined information is contained in the control channel data. The controlling of an outgoing call may prohibit a key operation for issuing a call from the mobile terminal device. The predetermined information is the data that requests outgoing call control. The outgoing call control method of the present invention further comprises displaying contents of outgoing call control when it is performed.
Moreover, an outgoing call control method of the present invention includes storing predetermined information and personal information, and communicating communications channel data with a radio base station. The method further comprises communicating control channel data with the radio base station at an appropriate timing independent of the control channel data, and judging whether the predetermined information is contained in the control channel data. Finally, the method comprises transferring the personal information if the predetermined information is contained in the control channel data. The personal information is transferred to a personal computer connected to at least one of a radio channel or a
cable channel. The method further comprises prohibiting a key operation for reading the personal information. The method may comprise displaying contents of data locking when it is performed.
A mobile terminal device of the present invention comprises a radio unit that communicates communications channel data with a radio base station, and that communicates control channel data with the radio base station at an appropriate timing independent of the control channel data. The mobile terminal device further comprises a memory that stores predetermined information, and an analysis unit that judges whether the predetermined information is contained in the control channel data received by the radio unit. The mobile term..ina! device filcher comprises a control unit that controls the radio unit on the basis of the result of the analysis unit.
The control unit exerts control over an outgoing call if the predetermined information is contained in the control channel data. The control unit may prohibit a key operation for issuing a call from the mobile terminal device. The predetermined information is the data that requests outgoing call control. The mobile terminal device further comprises a display unit that displays contents of outgoing call control when it is performed.
A mobile terminal device of the present invention comprises radio unit that communicates communications channel data with a radio base station, and that communicates control channel data with the radio base station at an appropriate timing independent of the control channel data. The mobile terminal device further comprises a memory that stores predetermined information and personal information, and an analysis unit that judges whether the predetermined information is contained in the control channel data received by the radio unit. The mobile - 6
terminal device further comprises a control unit that controls the personal information on the basis of the result of the analysis unit. The control unit transfers a personal information stored in the mobile terminal device if the predetermined information is contained in the control channel data. The personal information is transferred to a personal computer connected to a radio channel or a cable channel.
The control unit may prohibit a key operation for reading the personal information.
The mobile terminal device further comprises a display that displays contents of data locking when it is performed.
According to the present invention, the portable terminal device of the present invention does not use a communications channel circuit, but uses a control channel circuit when any of outgoing call control, the prohibition against unauthorized browsing of personal data, and the retreival of personal data is performed by remote control. By periodically receiving the control channel, the presence/absence of a request is analyzed, thereby performing control with higher reliability. That is, when a communications channel circuit is used in the remote control, the control can be interrupted on the base station side depending on the state of the communications traffic. For example, it can be interrupted during the transfer of personal data. Using a control channel, such interruption cannot occur, thereby reserving a circuit with high reliability.
Since remote control is performed by using a control channel without remote control using a communications channel circuit, it is not necessary for an answer from the third party who now holds a stolen or lost equipment, and
unauthorized outgoing calls or unauthorized browsing of personal data can be immediately prohibited.
Accordingly, the present invention can provide a portable terminal device capable of performing outgoing call control on a stolen or lost portable terminal device with high reliability without requesting an unauthorized user to return an answer or requesting an exchange center to reject an outgoing call, and capable of prohibiting the unauthorized browsing of personal data without requesting an unauthorized user to return an answer.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other aspects, features arid advantages of the invention will become more fully apparent from the following detailed description taken in
conjunction with accompanying drawings. In the drawings: FIG. 1 shows a configuration of an entire system of a portable terminal device according to an embodiment of the present invention; FIG. 2 is a block diagram of a circuit of a central portion of a lost mobile phone 1 shown in FIG. 1; FIG. 3 is a flowchart of the operation of a control channel of the lost mobile phone 1 shown in FIG. 1; and FIG. 4 is a flowchart of the detailed operations of a data transfer process shown in FIG. 3.
DETAILED DESCRIPTION OF THE EMBODIMENTS
Hereinafter, each embodiment of the present invention will be described in detail with reference to the drawings.
An embodiment is obtained by applying the present invention to a mobile phone, and the entire configuration will be described below by referring to FIG. 1. A lost mobile phone 1 can perform normal communications during power-
up, and can be set in a state of browsing telephone book data and incoming/outgoing call history data by a key operation.
The portable terminal device is configured to communicate with a number of mobile phones through an antenna 4 provided in a base station 3 connected via cable to a public line network 2. Practically, the equipment is configured to include radio means capable of communicating communications channel data with base station 3, and capable of communicating control channel data with the base station 3 at an appropriate timing independent of the communications channel data.
On the other hand, a data storage system 6 is connected to the public line network 2 through a modem device, which is not shown in FIG. 1. That is, a personal computer 7 operated by a user 5 is connected to the public line network 2.
At a result, communications with the personal computer 7 and both the base station 3 and the lost mobile phone 1 can be established. The personal data can be pulled out from the lost mobile phone 1 (as described later) is temporarily stored in the memory in the personal computer 7. A substitute mobile phone 8 is connected through a connection cable 9, thereby transferring the personal data to the substitute mobile phone 8.
The circuit of the portable terminal device (lost mobile phone 1) embodying the present invention is configured as shown in FIG. 2. That is, the equipment is provided with a conkrol unit 10 for combining and controlling the
operation of the mobile phone 1, and a radio unit 12 having an antenna 11 is connected to the control unit 10.
The radio unit 12 forms the central portion of radio means capable of communicating communications channel data with the base station 3 through the antenna it and the antenna 4, and communicating control channel data at an appropriate timing independent of the communications channel data.
A display unit 13 connected to the control unit 10 is configured to include display means capable of displaying a basic call functions, and displaying the contents of outgoing call control and/or data locking when they are performed.
The equipr.er.t data specifying the equipment (lost mobile phone 1i, and personal data 16 formed by telephone book data, outgoing call history data, incoming call history data, memo data, etc. is included in a memory block 14 connected to the control unit 10. The transfer permission data for permission of a request to transfer the personal data 16 is registered in the memory block 14, and permission data 15 in which data for permission of a request to lock a dial and memory is registered is included in the memory block 14. Thus, the central portion of the registration means can be configured.
received data analysis unit 17 connected to the control unit 10 forms determination means. Practically, the determination means compares transfer request data with the transfer permission data of the permission data 15, and determines whether or not they match each other when the control channel data received by the radio unit 12 includes the transfer request data. If the determination means detects a matching result between the transfer request data and the transfer permission data, then control means has the control unit 10 control the radio unit 12 -
_3 to transfer the personal data 16 to a predetermined destination. The personal data 16 will be transferred to the personal computer 7 of the data storage system 6. The control means also controls the radio unit 12 through the control unit 10 to exert control over an outgoing call when a matching result is detected between the outgoing call control request data and the outgoing call control permission data.
An arrow, shown in FIG. 1 by dotted lines from the user 5 toward to the antenna 4, indicates an electric wave path for remote control of the outgoing call control, prohibition against browsing personal data, and pull-out of personal data on the lost mobile phone 1. User 5 accomplishes this by using another mobile phone.
This operation will be described later, and the operation of the personal computer 7 connected to the public line network 2 at the time of performing the remote control will be described below by referring to the flowchart shown in FIG. 3.
The operations described below are performed on the assumption that the lost mobile phone 1 is located in the position where the lost mobile phone 1 can receive an electric wave transmitted through the antenna 4, and that the lost mobile phone 1 is powered up and set in a reception wait state. The outgoing call control operation and the data transfer operation are performed by obtaining data when the control channel data transmitted at an appropriate timing from the base station 3 through the antenna 4 is received by the radio unit 12 of the lost mobile phone 1 at S1. At S2, the received data analysis unit 17 analyzes the data, and then, at S3, the control unit 10 acts accordingly.
At S3, it is determined whether or not the received control channel data includes a request to transfer the personal data 16 or a request for the permission data 15. If there are no such requests (NO), then the process terminates.
- 11
On the other hand, if it is determined YES at S3, then at S4, it is determined whether or not there is memory lock permission data. If there is the permission data (YES), then control is passed to S5, where the request to lock the memory block is issued. Control then passed to S6, where it is determined whether or not there is personal data transmission permission. If it is determined NO at S4, however, control proceeds directed to S6. At S6, it is determined if there is permission to transfer personal data. If it is determined YES at S7, then a request to start transferring person data is issued. Otherwise, if it is determined NO at S6, control passes to S8, and the data transferring process is performed after proceeding to next S8, thereby terminating the process.
As shown in the flowchart in detail in FIG. 4, it is determined whether or not there is a request to start transfer of the personal data 16 in S9. If there is the request (YES), then control passes to S10, where the telephone book data, outgoing call history data, incoming call history data, and memo data stored in the personal data 16 is read by the control unit 10 and transmitted through the antenna 4, the radio unit 12 and the antenna 11 to the memory of the personal computer 7. The data is temporarily stored in the memory of the personal computer 7. Control is then passed to S1 1.
It is determined at S11 whether of not there is a request to lock the memory block 14. If there is the request (YES), then control is passed to S12, and the memory block 14 is locked, thereby terminating the process.
If it is determined in S9 that there is no request to start transferring the data (NO), then the above mentioned S11 and S12 are not performed.
- 12
Thus, outgoing call control is executed on the lost mobile phone 1, the unauthorized browsing of personal data is prohibited and the personal data is pulled from the lost mobile phone 1. Therefore, the third party having the lost mobile phone 1 cannot issue a call, and cannot browse personal data, thereby completely preventing an unauthorized use and unauthorized leakage of the personal data by the third party.
Furthermore, since the above mentioned preventing process is performed using the control channel without establishing a circuit of a communications channel, the process can be realized without waiting for a response to a call to the lost mobile phone 1. That is, it can be realized only if the lost mobile phone 1 ham been powered up and is located in the service area of the antenna 4, thereby realizing a perfect countermeasure.
If the lost mobile phone 1 has not been powered up yet, then it is powered up and simultaneously a call is automatically issued through a control channel circuit. Therefore, in response to the call, the base station 3 prepares data to remotely control the outgoing call control, the prohibition against unauthorized browsing of personal data, and the retrieval of personal data in advance. As a result, when the lost mobile phone 1 is powered up, the outgoing call control, the prohibition against browsing personal data, and the retrieval of personal data can be simultaneously performed.
On the other hand, as an example other than the above mentioned case in which the remote control is performed on the lost mobile phone 1 through the public line network 2 and the base station 3, the user 5 can perform remote control on the base station 3 using a mobile phone. In this case, a control code for execution - 13
of the outgoing call control, the prohibition against browsing personal data, and the retrieval of personal data is transmitted from the user 5.
In this case, the retrieval of personal data can be directly performed if there is a sufficiently large memory capacity of the equipment. If there is no sufficiently large memory, the data is temporarily stored in the base station 3, and is fetched later using a personal computer or other communication devices By allowing the personal computer 7 storing the personal data 16 fetched from the lost mobile phone 1 to be remotely controlled to be connected to the substitute mobile phone 8 with the connection cable 9 connected through a predeten.n.ined interface circuit Ad to execute the edit so^.,are of the data of the mobile phone built in the personal computer 7, the personal data 16 of the lost mobile phone 1 can be transferred as is in the substitute mobile phone 8, or in an edited state.
As a result, the personal data can be retrieved regardless of whether or not the lost mobile phone 1 is practically held at hand.
In the explanation above, the portable terminal device (lost mobile phone 1) comprises a first control means for exerting control over an outgoing call by controlling the radio means when a matching result is detected between the outgoing call control request data and the outgoing call control permission data. The portable terminal device comprises a second control means for transferring the personal data to a predetermined destination by controlling the radio means when a matching result is detected between the transfer request data and the transfer permission data. However, the portable terminal device can also be configured by comprising one of the first control means and the second control means.
- 14
The outgoing call control on the portable terminal device can function as software by directly prohibiting a call issuing operation, or can perform indirect prohibition by providing operation lock means for suppressing the key operation of issuing a call. Similarly, the prohibition against browsing personal data can function as software by directly prohibiting a browsing operation, or can perform indirect prohibition by providing data lock means for suppressing the key operation of browsing the personal data. The personal data pulled out from the portable terminal device (lost mobile phone 1) can be stored in the personal computer 7, directly stored in the substitute mobile phone 8, temporarily stored in the base station 3 and then fetched later, etc. Furthermore, the permission data registered in advance in the lost mobile phone 1 for determination of the outgoing call control, the prohibition against browsing personal data, and the retrieval of personal data can be configured by including a telephone number and/or the equipment number or by a password at the discretion of the user.
Additionally, when the outgoing call control and/or data lock is perfonned, the contents can be displayed indicating "this phone is not available" or "please contact the owner XXX" on the display unit 13.
Obviously, numerous additional modifications and variations of the present invention are possible in light of the above teachings. It is, therefore, to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described herein.
- 15

Claims (31)

1. A mobile terminal device comprising: radio means for communicating communications channel data with a radio base station, and for communicating control channel data with said radio base station at an appropriate timing independent of said control channel data; storing means for storing predetermined information; judging means for judging whether said predetermined information is contained in said control channel data received by said radio means; and controlling means for cor, trolling said radio means on the basis of the result of said judging means.
2. The mobile terminal device as claimed in claim 1, wherein said controlling means prevents an outgoing call if said predetermined information is contained in said control channel data.
3. The mobile terminal device as claimed in claim 2, wherein said controlling means prohibits a key operation for issuing a call from said mobile terminal device.
4. The mobile terminal device as claimed in claim 3, wherein said predetermined information is the data that requests outgoing call control.
- 16
5. The mobile terminal device as claimed in claim 4, further comprising display means for displaying the contents of outgoing call control when it is performed.
6. A mobile terminal device comprising: radio means for communicating communications channel data with a radio base station, and for communicating control channel data with said radio base station at an appropriate timing independent of said control channel data; storing means for storing predetermined information and personal information; judging means for judging whether said predetermined information is contained in said control channel data received by said radio means; and controlling means for controlling said personal information on the basis of the result of said judging means.
7. The mobile terminal device as claimed in claim 6, wherein said controlling means transfers said personal information stored in said mobile terminal device if said predetermined information is contained in said control channel data.
8. The mobile terminal device as claimed in claim 7, wherein said personal information is transferred to a personal computer connected to at least one of a radio channel and a cable channel.
- 17
f '
9. The mobile terminal device as claimed in claim 8, wherein said controlling means prohibits a key operation for reading said personal information.
10. The mobile terminal device as claimed in claim 9, further comprising display means for displaying contents of data locking when it is performed.
11. An outgoing call control method, comprising: storing predetermined information; communicating communications channel data with a radio base station; cor=.l licating, control channel data with said radio base station at an appropriate timing independent of said control channel data; judging whether said predetermined information is contained in said control channel data; and controlling an outgoing call if said predetermined information is contained in said control channel data.
12. The outgoing call control method as claimed in claim 11, wherein said controlling an outgoing call comprises prohibiting a key operation for issuing a call from said mobile terminal device.
13. The outgoing call control method as claimed in claim 12, wherein said predetermined information is the data that requests outgoing call control.
- 18
14. The outgoing call control method as claimed in claim 13, further comprising displaying contents of outgoing call control when it is performed.
15. A data transfer method, comprising: storing predetermined information and personal information; communicating communications channel data with a radio base station; communicating control channel data with said radio base station at an appropriate timing independent of said control channel data; judging whether said predetermined information is contained in said control channel data; and transferring said personal information if said predetermined information is contained in said control channel data.
16. The data transfer method as claimed in claim 15, wherein said personal information is transferred to at least one of a personal computer connected to a radio channel and a cable channel.
17. The data transfer method as claimed in claim 16, further comprising prohibiting a key operation for reading said personal information.
18. The data transfer method as claimed in claim 17, further comprising displaying contents of data locking when it is performed.
- 19
- in
19. A mobile terminal device comprising: a radio unit that communicates communications channel data with a radio base station, and that communicates control channel data with said radio base station at an appropriate timing independent of said control channel data; a memory that stores a predetermined information; an analysis unit that judges whether said predetermined information is contained in said control channel data received by said radio unit; and a control unit that controls said radio unit on the basis of the result of said analysis unit.
20. The mobile terminal device as claimed in claim 19, wherein said control unit controls an outgoing call if said predetermined information is contained in said control channel data.
21. The mobile terminal device as claimed in claim 20, wherein said control unit prohibits a key operation for issuing a call from said mobile terminal device.
22. The mobile terminal device as claimed in claim 21, wherein said predetermined information is the data that requests outgoing call control.
23. The mobile terminal device as claimed in claim 22, further comprising a display unit that displays contents of outgoing call control when it is performed. - 20
I/ !
24. A mobile terminal device comprising: a radio unit that communicates communications channel data with a radio base station, and that communicates control channel data with said radio base station at an appropriate timing independent of said control channel data; a memory that stores predetermined information and personal information; an analysis unit that judges whether said predetermined infonnation is contained in said control channel data received by said radio unit; and a control unit that controls said personal information on the basis of the result of said analysis unit.
25. The mobile terminal device as claimed in claim 24, wherein said control unit transfers a personal information stored in said mobile terminal device if said predetermined information is contained in said control channel data.
26. The mobile terminal device as claimed in claim 25, wherein said personal information is transferred to at least one of a personal computer connected to a radio channel and a cable channel.
27. The mobile terminal device as claimed in claim 26, wherein said control unit prohibits a key operation for reading said personal information.
28. The mobile terminal device as claimed in claim 27, further comprising a display that displays contents of data locking when it is performed.
-21
-
29. A mobile terminal device substantially as herein described with reference to the drawings.
30. An outgoing call control method substantially as herein described with reference to the drawings.
5
31. A data transfer method substantially as herein described with reference to the drawings.
- 22
GB0215887A 2001-07-16 2002-07-09 Portable terminal device and methods therefor Expired - Fee Related GB2379583B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2001214651A JP2003032354A (en) 2001-07-16 2001-07-16 Mobile communication device

Publications (3)

Publication Number Publication Date
GB0215887D0 GB0215887D0 (en) 2002-08-14
GB2379583A true GB2379583A (en) 2003-03-12
GB2379583B GB2379583B (en) 2003-10-01

Family

ID=19049426

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0215887A Expired - Fee Related GB2379583B (en) 2001-07-16 2002-07-09 Portable terminal device and methods therefor

Country Status (4)

Country Link
US (1) US20030013491A1 (en)
JP (1) JP2003032354A (en)
CN (1) CN1398097A (en)
GB (1) GB2379583B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2388752A (en) * 2002-04-09 2003-11-19 Nec Corp Disablement of a lost or stolen mobile
GB2393881A (en) * 2002-09-04 2004-04-07 Nec Corp Remotely accessing information stored in a mobile phone
GB2407458A (en) * 2003-08-07 2005-04-27 Radioscape Ltd Preventing use of lost/stolen article by transmission of blocking code
GB2381703B (en) * 2001-11-02 2006-05-10 Agere Syst Guardian Corp Wireless device temporary recovery mode services and functionality

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW586307B (en) * 2002-12-13 2004-05-01 Inventec Appliances Corp Recovery method for mobile phone data
JP2004274310A (en) 2003-03-07 2004-09-30 Sony Ericsson Mobilecommunications Japan Inc Mobile terminal device
US20060281450A1 (en) * 2003-04-01 2006-12-14 X-Cyte, Inc., A California Corporation Methods and apparatuses for safeguarding data
JP2005141688A (en) * 2003-11-10 2005-06-02 Nec Corp Mobile communication terminal and content management method
US20050186954A1 (en) * 2004-02-20 2005-08-25 Tom Kenney Systems and methods that provide user and/or network personal data disabling commands for mobile devices
US7564799B2 (en) * 2004-04-23 2009-07-21 Intermec Ip Corp. System and method for providing seamless roaming
US7205895B2 (en) * 2004-06-29 2007-04-17 International Business Machines Corporation Locating a wireless device
US7280652B2 (en) 2004-09-13 2007-10-09 Research In Motion Limited Handheld electronic device having improved phone call log, and associated method
JP2006287503A (en) * 2005-03-31 2006-10-19 Nec Corp Security enhancement system, security enhancement method, and its program
TW200644592A (en) * 2005-06-08 2006-12-16 Benq Corp Method for operating handset remote listen-in using short messages
US9148431B2 (en) 2006-12-12 2015-09-29 Qualcomm Incorporated Systems and methods for caller identification customization and remote management of communication devices
US9792453B2 (en) * 2007-09-26 2017-10-17 Lenovo (Singapore) Pte. Ltd. Remote computer lockdown
WO2009107994A2 (en) * 2008-02-28 2009-09-03 (주)쏘몬 Method and system of providing personal information control service for mobile communication terminal
JP5472959B2 (en) * 2008-04-22 2014-04-16 Necインフロンティア株式会社 Electronic device, key lock setting method, key lock setting program, and program recording medium
US8666367B2 (en) 2009-05-01 2014-03-04 Apple Inc. Remotely locating and commanding a mobile device
US8670748B2 (en) 2009-05-01 2014-03-11 Apple Inc. Remotely locating and commanding a mobile device
US8660530B2 (en) 2009-05-01 2014-02-25 Apple Inc. Remotely receiving and communicating commands to a mobile device for execution by the mobile device
US9158496B2 (en) * 2012-02-16 2015-10-13 High Sec Labs Ltd. Secure audio peripheral device
TWI499933B (en) * 2013-11-21 2015-09-11 Qnap Systems Inc Electronic device and login method therefore
CN105100362A (en) * 2014-05-20 2015-11-25 中兴通讯股份有限公司 Fraud call identification method, fraud prevention method and call terminal
US10868902B2 (en) * 2018-04-16 2020-12-15 Mobileyme Llc System and method for using a secondary device to access information stored remotely
CN108848508B (en) * 2018-08-30 2021-04-02 中国联合网络通信集团有限公司 Pseudo base station identification method, mobile terminal and background system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000151798A (en) * 1998-11-05 2000-05-30 Sharp Corp Portable telephone provided with dial/data locking function
US6091945A (en) * 1996-03-29 2000-07-18 Sony Corporation Authentication method for radio communication system, radio communication system, radio communication terminal and communication managing apparatus
JP2001352579A (en) * 2000-06-07 2001-12-21 Nec Corp Security system and security method for portable telephone set
JP2002159052A (en) * 2000-11-17 2002-05-31 Nec Kofu Ltd Mobile terminal with finger print authentication function
JP2002185631A (en) * 2000-12-14 2002-06-28 Nec Corp Backup service system for telephone directory information, and method for executing backup service of telephone directory information

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5915225A (en) * 1996-03-28 1999-06-22 Ericsson Inc. Remotely retrieving SIM stored data over a connection-less communications link
JP3098442B2 (en) * 1997-01-28 2000-10-16 日本電気移動通信株式会社 Telephone system
JP3621612B2 (en) * 1999-09-09 2005-02-16 株式会社日立国際電気 Mobile phone
US6529724B1 (en) * 1999-10-26 2003-03-04 Qualcomm Incorporated System and method for managing contact information based on use of a communications device
JP3404353B2 (en) * 2000-03-31 2003-05-06 真二 青山 Data backup method for portable telephone, portable telephone and data backup device for portable telephone
US6662023B1 (en) * 2000-07-06 2003-12-09 Nokia Mobile Phones Ltd. Method and apparatus for controlling and securing mobile phones that are lost, stolen or misused
US6813487B1 (en) * 2000-10-18 2004-11-02 David Alan Trommelen Method and apparatus for securing data stored in a remote electronic device
US6813498B1 (en) * 2000-10-27 2004-11-02 Lucent Technologies Inc. Apparatus, method and system for detection and recovery of missing wireless devices in communication systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6091945A (en) * 1996-03-29 2000-07-18 Sony Corporation Authentication method for radio communication system, radio communication system, radio communication terminal and communication managing apparatus
JP2000151798A (en) * 1998-11-05 2000-05-30 Sharp Corp Portable telephone provided with dial/data locking function
JP2001352579A (en) * 2000-06-07 2001-12-21 Nec Corp Security system and security method for portable telephone set
JP2002159052A (en) * 2000-11-17 2002-05-31 Nec Kofu Ltd Mobile terminal with finger print authentication function
JP2002185631A (en) * 2000-12-14 2002-06-28 Nec Corp Backup service system for telephone directory information, and method for executing backup service of telephone directory information

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2381703B (en) * 2001-11-02 2006-05-10 Agere Syst Guardian Corp Wireless device temporary recovery mode services and functionality
GB2388752A (en) * 2002-04-09 2003-11-19 Nec Corp Disablement of a lost or stolen mobile
GB2388752B (en) * 2002-04-09 2004-10-13 Nec Corp Mobile communication terminal
US7245907B1 (en) 2002-04-09 2007-07-17 Nec Corporation Mobile communication terminal remote control system, mobile communication terminal, remote control method, and remote control program
GB2393881A (en) * 2002-09-04 2004-04-07 Nec Corp Remotely accessing information stored in a mobile phone
GB2393881B (en) * 2002-09-04 2006-05-10 Nec Corp Mobile telephone apparatus with remote access function for external network and remote access method for mobile communication system
US8014758B2 (en) 2002-09-04 2011-09-06 Nec Corporation Mobile telephone apparatus with remote access function for external network and remote access method for mobile communication system
GB2407458A (en) * 2003-08-07 2005-04-27 Radioscape Ltd Preventing use of lost/stolen article by transmission of blocking code
GB2407458B (en) * 2003-08-07 2006-05-24 Radioscape Ltd Method of preventing use of a lost or stolen device including a digital transmission receiver

Also Published As

Publication number Publication date
GB2379583B (en) 2003-10-01
US20030013491A1 (en) 2003-01-16
GB0215887D0 (en) 2002-08-14
JP2003032354A (en) 2003-01-31
CN1398097A (en) 2003-02-19

Similar Documents

Publication Publication Date Title
GB2379583A (en) Outgoing call control and data transfer for a portable terminal device
US10051100B2 (en) Mobile terminal apparatus
US7200220B1 (en) Portable telephone maintenance service system and maintenance service method
US7233791B2 (en) Cell phone feature for downloading information via a telecommunications network
US7292843B2 (en) Function-limiting device and function-limiting method
US7275695B2 (en) Portable terminal and function limiting method
EP0865217A2 (en) Telecommunications system
US20040043752A1 (en) Terminal for wireless communication
US6470082B1 (en) Communications system using portable recording medium
JP2001230858A (en) Mobile phone system and mobile phone
JP3357592B2 (en) Mobile station information storage device and mobile communication system
US20050003800A1 (en) Cellular phone having mail and schedule functions
JP2000174894A (en) Portable telephone set
JP2002281148A (en) Mobile telephone
CA2552480A1 (en) Cell phone feature for downloading information via a telecommunications network
JP2004289690A (en) Mobile terminal device
US20040048602A1 (en) Mobile telephone apparatus with remote access function for external network and remote access method for mobile communication system
EP0744875B1 (en) Subscriber number storing device and mobile station using the same
JP2004356685A (en) Portable communication terminal and system for controlling portable communication terminal
JP3652893B2 (en) Satellite communication terminal
JP4199056B2 (en) Control device and control system
JP2001111703A (en) Mobile wireless communication terminal device and remote control method for the mobile wireless communication terminal device
JP2001127878A (en) Radio communication system and portable telephone set
JP2002158771A (en) Telephone network system for phone exchange by personal id
JP2002368875A (en) Communication service method and communication service system

Legal Events

Date Code Title Description
732E Amendments to the register in respect of changes of name or changes affecting rights (sect. 32/1977)

Free format text: REGISTERED BETWEEN 20141023 AND 20141029

PCNP Patent ceased through non-payment of renewal fee

Effective date: 20170709